Information Technology Security. Advice from Experts

Identify the processes that are currently being used to mitigate the vulnerability or threat. Mitigation categories refer to types of controls. The most common controls are:

Other types include:

The assessment of current controls should review four key areas:

Based on the effectiveness of existing controls and in light of the detailed review of vulnerabilities and threats, make recommendations on what else can be done to mitigate vulnerabilities and threats. Additional controls, new processes and/or new technology may be necessary. Obviously the final recommendations incorporated into the risk mitigation plan should present the options felt to offer the optimal value-added return on investment for the resources required and hence deliver the greatest impact to the business.

Once recommendations have been made for all risks, validate that they:

Категории